diff options
author | Jeff Layton <jlayton@redhat.com> | 2013-05-24 07:40:04 -0400 |
---|---|---|
committer | Steve French <sfrench@us.ibm.com> | 2013-05-24 13:08:26 -0500 |
commit | 539673fff76af73c3aee96e0de10edcc97d84db3 (patch) | |
tree | 4152d8e09ffca2213ed130362ea1ca64b2cf9a24 | |
parent | 166faf21bd14bc5c5295a44874bf7f3930c30b20 (diff) | |
download | op-kernel-dev-539673fff76af73c3aee96e0de10edcc97d84db3.zip op-kernel-dev-539673fff76af73c3aee96e0de10edcc97d84db3.tar.gz |
cifs: allow sec=none mounts to work against servers that don't support extended security
In the case of sec=none, we're not sending a username or password, so
there's little benefit to mandating NTLMSSP auth. Allow it to use
unencapsulated auth in that case.
Signed-off-by: Jeff Layton <jlayton@redhat.com>
Signed-off-by: Steve French <sfrench@us.ibm.com>
-rw-r--r-- | fs/cifs/connect.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c index 99eeaa1..0a7fdc3 100644 --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c @@ -1061,6 +1061,7 @@ static int cifs_parse_security_flavors(char *value, #endif case Opt_sec_none: vol->nullauth = 1; + vol->secFlg |= CIFSSEC_MAY_NTLM; break; default: cifs_dbg(VFS, "bad security option: %s\n", value); |